Marriott’s Costly Mistake: Letting Compliance Trump Security

Posted by Jeremiah Cruit | CISO on Dec 3, 2018 8:29:45 AM

Friday’s news of Marriott’s massive breach sent shock waves throughout the cybersecurity industry and consumer sectors alike. Brian Krebs described the “colossal intrusion” and numerous other security experts joined in to analyze what missteps the chain may have taken, how the breach could have been prevented, and what we as an industry can learn from the catastrophe.

Read More

Topics: Threat Intelligence

Using Android Proxy Browsers - Convenience without Web Application Security

Posted by Aaron Fosdick on Aug 6, 2018 9:03:36 AM

Slow. Antiquated. Android.

Remember the old Android device you used to use? Many of us have old versions of these devices sitting around that worked well 5 or 6 years ago, but are, unfortunately, too slow or outdated to use today. The hardware is lethargic and the Android OS hasn’t been patched for years. This is never more evident than when you try using a web browser on one of these devices and watch it struggle while rendering an element-rich site. The fact is, older devices simply don’t have sufficient CPU power to quickly display a complex page, even those designed to be responsive or mobile friendly.

Read More

Topics: Threat Intelligence

Combatting Botnet Traffic with Behavioral Analysis: Part III

Posted by Will Woodson | Senior Security Engineer on Jul 12, 2018 11:54:37 AM

In the first two parts of this series we discussed methods to identify and block a few different types of botnet traffic, namely commodity comment/form spam and slightly more targeted attacks like distributed password guessing. This final part covers a slightly different way of analyzing malicious web traffic: grouping attackers based on their behavioral characteristics.

Read More

Topics: Threat Intelligence

Combatting Botnet Traffic with Behavioral Analysis: Part II

Posted by Will Woodson | Senior Security Engineer on Jun 28, 2018 11:28:17 AM

The previous post in this series discussed comment spam, one of the most pervasive forms of 'botnet' web traffic and accordingly, one of the least targeted varieties of attack. Part II will discuss a more serious form of botnet traffic: Targeted attacks that are coordinated centrally and distributed across multiple actors in an attempt to avoid security controls.

Read More

Topics: Threat Intelligence

Combatting Botnet Traffic with Behavioral Analysis: Part I

Posted by Will Woodson | Senior Security Engineer on Jun 6, 2018 7:25:47 AM

The following is the first post in a three-part series surrounding bot detection and neutralization based on botnet analysis. The series will begin by addressing commodity form/comment spam. 

One of the unfortunate realities of running a site on the Internet is the amount of "background noise" -- the automated, unsophisticated, poorly targeted attacks, which make up the bulk of malicious web traffic. For the sake of this series, we're calling this 'botnet' traffic. 

Botnet traffic can be a nuisance, no doubt, but it isn't necessarily interesting or deserving of action until viewed in aggregate. The posts in this series describe methods for identifying and blocking botnet traffic, and aggregating this data, each through a different case:
 
1. Identifying Bot Behavior - Form Spam 
2. Bot Behavior - Distributed Attacks
3. Behavioral Analysis - Grouping Bot Actors
 
Read More

Topics: Threat Intelligence

Unexpected Web Application Attacks: When Not to Trust Your Search Engine

Posted by Aaron Fosdick on May 31, 2018 8:13:19 AM

In today’s complex cybersecurity landscape, it is very apparent that threats can and will originate from virtually anywhere and hardly ever follow predictable patterns. We consistently share this knowledge with our customers and use these insights to drive our product updates and roadmap.

This fact alone makes the task of properly securing your applications even more challenging. To effectively secure your applications, it is critical to implement security controls using the zero-trust model. That means you should not rely solely on external reputation sources, threat feeds, or patches. In fact, we have found that many of the threats we identify using behavioral analysis methods go undetected when using the more traditional methods. More accurate and reliable detection is critical to effective application security, especially when attacks come from the most unsuspecting of sources.

Read More

Topics: Threat Intelligence

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part II

Posted by Aaron Fosdick on May 8, 2018 9:35:00 AM

Continued from part I. Credit card fraud is an increasingly prevalent issue for card holders, card issuers, and merchants alike. Traditional approaches to WAF technology may lack the intelligence to detect and neutralize credit card fraudsters, but there are new ways, such as Threat X's contextual behavioral analysis, that are effective in neutralizing these attacks. 

Read More

Topics: Threat Intelligence

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part I

Posted by Aaron Fosdick on Apr 19, 2018 11:55:00 AM

In part I of this two-part series, we will discuss the growing issue of credit card fraud for card issuers, card holders, and merchants, including how card data is being obtained and used by today's advanced attackers.

Read More

Topics: Threat Intelligence

Threat X Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me